{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T07:11:37Z","timestamp":1768806697314,"version":"3.49.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/bigdata.2016.7841038","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T16:46:59Z","timestamp":1486486019000},"page":"3703-3712","source":"Crossref","is-referenced-by-count":32,"title":["Phishing through social bots on Twitter"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Shafahi","sequence":"first","affiliation":[]},{"given":"Leon","family":"Kempers","sequence":"additional","affiliation":[]},{"given":"Hamideh","family":"Afsarmanesh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7364017"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883936"},{"key":"ref31","first-page":"30","article-title":"Measuring user influence in twitter: The million follower fallacy","volume":"10","author":"cha","year":"2010","journal-title":"ICWSM"},{"key":"ref30","article-title":"Internet archive - verified accounts (@verified) &#x2014; twitter","year":"2016"},{"key":"ref35","article-title":"Demographics of key social networking platforms","volume":"9","author":"duggan","year":"2015","journal-title":"Pew Research Center"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2024288.2024326"},{"key":"ref10","article-title":"2015 data breach investigations report","year":"2015"},{"key":"ref11","article-title":"What is a socialbot?","author":"rouse","year":"2016"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v18i7.4217","article-title":"You followed my bot! transforming robots into influential users in twitter","volume":"18","author":"messias","year":"2013","journal-title":"First Monday"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682691"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.183"},{"key":"ref15","article-title":"People are strange when you're a stranger: Impact and influence of bots on social networks","author":"aiello","year":"2014","journal-title":"arXiv preprint arXiv 1407 8134"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23456"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.08.013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2013.6642447"},{"key":"ref19","first-page":"2","article-title":"When social bots attack: Modeling susceptibility of users in online social networks","author":"wagner","year":"2012","journal-title":"Making Sense of Microposts (# MSM2012)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2634887"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"ref27","article-title":"Microsoft consumer safety index reveals impact of poor online safety behaviours in singapore","year":"2014"},{"key":"ref3","article-title":"The rise of social bots","volume":"abs 1407 5225","author":"ferrara","year":"2014","journal-title":"CoRR"},{"key":"ref6","article-title":"Social media bots offer phony friends and real profit","author":"bilton","year":"2016"},{"key":"ref29","article-title":"There is a possibility that the quality of twitter's users is deteriorating","author":"edwards","year":"2015","journal-title":"Business Insider"},{"key":"ref5","article-title":"Buying fake &#x201C;bots&#x201D; to beef up social media accounts is a thriving business","author":"akhtar","year":"2014"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2808797.2809292","article-title":"Reverse engineering socialbot infiltration strategies in twitter","author":"freitas","year":"2015","journal-title":"Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015"},{"key":"ref7","article-title":"Quarterly report pursuant to section 13 or 15(d) of the securities exchange act of 1934","year":"2016"},{"key":"ref2","article-title":"I flirt and tweet. follow me at #socialbot","author":"urbina","year":"2016"},{"key":"ref9","article-title":"Phishing activity trends report-4th quarter 2014","year":"2015"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.347.6218.116"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2014.6921650"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.75"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.01.007"},{"key":"ref24","article-title":"Nist special publication 800-83. guide to malware incident prevention and handling","author":"mell","year":"2005"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1145\/2872518.2889302","article-title":"Botornot: A system to evaluate social bots","author":"davis","year":"2016","journal-title":"Proceedings of 20th International Conference Companion on World Wide Web"},{"key":"ref26","article-title":"Kaspersky security bulletin. spam and phishing in 2015","author":"vergelis","year":"2016"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701788165"}],"event":{"name":"2016 IEEE International Conference on Big Data (Big Data)","location":"Washington DC,USA","start":{"date-parts":[[2016,12,5]]},"end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7818133\/7840573\/07841038.pdf?arnumber=7841038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T07:18:48Z","timestamp":1568791128000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7841038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2016.7841038","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}